A mobile vehicle communications system and a method of determining the legitimacy of a wireless sensor signal received by an electronic control unit (ecu) in a vehicle. The method includes the steps of: receiving at the electronic control unit (ecu) a first wireless signal identified as being from a first vehicle sensor; performing a correlation procedure at the ecu using the first wireless signal; and based on the correlation procedure, determining whether the first wireless signal is a legitimate signal sent by the first vehicle sensor.
|
7. A method of determining the legitimacy of a wireless sensor signal received by an electronic control unit (ecu) installed in a vehicle, comprising the steps of:
receiving at the ecu a first wireless signal received from a first vehicle sensor installed within the vehicle;
receiving a second wireless signal at the ecu from a second vehicle sensor installed within the vehicle, wherein the second wireless signal is being spoofed by a malicious attacker;
performing a correlation procedure at the ecu using the first and second wireless signals; and
detecting the occurrence of a malicious attack based on an absence of correlation between the first and second wireless signals, wherein the correlation procedure includes using a window that captures the signal strengths of the first and second wireless signals, and wherein prior to detecting the occurrence of the malicious attack, the first and second wireless signals exhibit correlation and following the second wireless signal being spoofed by the malicious attacker, the correlation procedure determines an absence of correlation between the first and second wireless signals.
1. A method of determining the legitimacy of a wireless sensor signal received by an electronic control unit (ecu) installed in a vehicle, comprising the steps of:
receiving at the electronic control unit (ecu) a first wireless signal purportedly received from a first vehicle sensor installed within the vehicle;
receiving at the ecu a second wireless signal;
performing a correlation procedure at the ecu using the first wireless signal and the second wireless signal to verify that the first wireless signal is a legitimate signal in that it originated from the first vehicle sensor, wherein the correlation procedure includes using a first window and a second window that capture a signal strength of the first wireless signal, wherein the first window captures the first wireless signal during a first time period and the second window captures the first and the second wireless signals during a second time period that differs from the first time period; and
determining that the first wireless signal is not a legitimate signal sent by the first vehicle sensor when an absence of correlation exits between the first and second windows based on the correlation procedure, wherein the absence of correlation occurs as a result of the signal strength of the first window differing from the signal strength of the second window.
2. The method of
3. The method of
4. The method of
6. The method of
8. The method of
9. The method of claim7, wherein the correlation of the first and second wireless signals from the vehicle sensors is based on a spatial proximity of the first and second vehicle sensors, wherein the absence of correlation is determined based on a lack of spatial proximity of the first vehicle sensor and the malicious attacker.
10. The method of
11. The method of
12. The method of
|
The present invention relates to transmission of secure wireless data between vehicle components.
Some wireless communication networks comprise a wireless controller for performing task(s) in response to data received via transmissions from one or more wireless sensors. The data shared over such networks is susceptible to interception and/or manipulation by hackers and/or other malicious persons and techniques. In order to subvert these activities, cryptography and laborious computational techniques have been employed. Such anti-hacking technology and techniques often include additional hardware, software, and processing techniques. This increases design costs, occupies a larger spatial footprint (e.g., to make room for the hardware), and hampers processing speed and/or response time of the system.
Due to these and other similar drawbacks, wireless communication between a vehicle electronic controller and vehicle sensors traditionally has been undesirable. For example, additional computational hardware is costly; similarly in vehicle applications, additional hardware may be undesirable in view of vehicle space and weight requirements. And additional processing performed to enhance security but which also slows down response time may not be desirable for safety reasons (e.g., when rapid response time is needed, such as during collision avoidance). Thus, there is a need for a secure means for communicating data between a vehicle ECU and one or more wireless vehicle sensors while limiting increased cost, minimizing spatial requirements, and not inhibiting wireless communication speed.
According to an embodiment of the invention, there is provided a method of determining the legitimacy of a wireless sensor signal received by an electronic control unit (ECU) in a vehicle. The method includes the steps of: receiving at the electronic control unit (ECU) a first wireless signal identified as being from a first vehicle sensor; performing a correlation procedure at the ECU using the first wireless signal; and based on the correlation procedure, determining whether the first wireless signal is a legitimate signal sent by the first vehicle sensor.
One or more embodiments of the invention will hereinafter be described in conjunction with the appended drawings, wherein like designations denote like elements, and wherein:
The system described below includes a vehicle communication network that enables wireless communication between two or more vehicle sensors and at least one electronic control unit (ECU) in the vehicle. In some instances, the data conveyed between the sensors and the ECU can be sensitive and a target of malicious attack (e.g. spoofing of one of the vehicle sensors). This system uses one or more correlation techniques to detect malicious attacks so that, e.g., such spoofed data can be ignored.
Communications System—
With reference to
Communication link(s) 16 include any wired link or connection 16a, any wireless link or connection 16b, or a combination of both. In the illustrated implementation, both are shown; however, this is merely an example and other implementations are possible. Wired link 16a is shown connecting or physically coupling the VSMs 18 to one another. Non-limiting examples of wired connection 16a include a communications bus, an entertainment bus, or the like which may utilize one or more of the following: a controller area network (CAN), a media oriented system transfer (MOST), a local interconnection network (LIN), a local area network (LAN), and other appropriate connections such as Ethernet, Audio-Visual Bridging (AVB), or others that conform with known ISO, SAE and IEEE standards and specifications, to name but a few. As shown in
VSM 18 (
Non-limiting examples of VSMs 18 include a vehicle telematics unit, an infotainment module, a GPS navigation module, an engine control module (ECM), a powertrain control module (PCM), a body control module (BCM), and a tire pressure monitoring system (TPMS) module. Telematics devices can be used to provide a diverse range of services to vehicle 12 that involve wireless communication to and/or from the vehicle. Infotainment devices can facilitate providing audio/visual information and entertainment services to vehicle occupants. GPS navigation modules can determine vehicle position that is used for providing navigation and other position-related services to a vehicle driver. ECMs can control various aspects of engine operation such as fuel ignition and ignition timing, while PCMs can regulate operation of one or more components of the vehicle powertrain. BCMs can govern various electrical components located throughout the vehicle, like the vehicle's power door locks and headlights. A TPMS module can monitor the air pressure with pneumatic tires on the vehicle and provide alerts when the pressure of one of the tires falls below a predetermined level. These VSMs 18 are only listed by way of example. Other module implementations are also possible.
Processor(s) 32 can be any type of device capable of processing electronic instructions including microprocessors, microcontrollers, host processors, controllers, vehicle communication processors, and application specific integrated circuits (ASICs). It can be a dedicated processor used only for ECU 30 or can be shared with other vehicle systems. Processor 32 executes various types of digitally-stored instructions, such as software or firmware programs stored in memory 34, which enable ECU 30 to provide a wide variety of services. For instance, processor 32 can execute programs or process data to carry out at least a part of the method discussed herein.
Memory 34 may include computer usable or readable medium, which include one or more storage devices or articles. Exemplary non-transitory computer usable storage devices include conventional computer system RAM (random access memory), ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes. In at least one embodiment, memory 34 is a non-transitory computer readable medium.
Receiver 38 includes any suitable device for receiving wireless communications from sensors 20. In at least one embodiment, receiver 38 and antenna 40 are configured to receive sensor data via short-range wireless communication (SRWC) (e.g., via one of the protocols listed above). Receiver 54 may be a transceiver and/or may be used in other vehicle applications (e.g., ECU-to-ECU communication); however, this is not required.
Other electronic circuitry 36 may include any other electronic circuit components or sub-circuits for determining or measuring various characteristics of received sensor signals, as well as for carrying out functions related to the VSM (e.g., engine control, powertrain control, tire pressure monitoring, etc.). In one embodiment, circuitry 36 includes a configuration to suitably measure the strength of (e.g., quantify the power of) wireless signals received from sensors 20 (e.g., determine a received signal strength indication (RSSI)). This of course is merely an example; other implementations are also possible.
It will be appreciated that although the VSM 18 is illustrated schematically, components thereof may be electronically coupled to one another. For example, processor 32 may be coupled to memory 34 and circuitry 36, memory 34 may be coupled to circuitry 36 as well, etc. In addition, memory 34 of ECU 30 is shown to include application software 42 stored thereon which is executable by processor(s) 32. This application software comprises a set of instructions that may be carried out to verify or validate the source of the sensor data; i.e., to make sure that sensor data received at ECU 30 via the wireless link 16b is legitimate and not spoofed by a malicious attacker. Therefore, as will be explained in greater detail below, application software 42 provides at least one means for carrying out the methods described herein.
Method—
Turning now to
It should be appreciated that method 300 does not preclude the use of other security techniques which may require extensive computations (e.g., for encryption and decryption). However, it will be appreciated that in at least one embodiment, the first, second, and/or third wireless signals may not be encrypted or decrypted. And without performing encryption in method 300, undesirable system latencies may be avoided. Following steps 310, 320, and 330, the method proceeds to step 340.
In step 340, the ECU 30 performs at least one correlation procedure. As used herein, a correlation procedure includes evaluating a relationship in the change of two wireless signals received by the ECU. For example, consider the ECU 30 receiving the first wireless signal and the second wireless signal (e.g., from sensors 20a, 20b) in real-time. The correlation procedure may determine that the two wireless signals have correlation (or are highly correlated to one another) or that they do not have correlation (e.g., an absence of correlation). As used herein, an absence of correlation includes any suitable instance where a skilled artisan would consider the correlation sufficiently low to determine that the relationship fails to indicate spatial or temporal correlation between the evaluated signals. This includes instances where two or more signals are evaluated or even a single signal is evaluated at different times—both examples are discussed in greater detail below. When the two signals have correlation, the relationship between the two signals may be causal, parallel, reciprocal, or the like. A causal relationship may occur, e.g., when changes in the first wireless signal (from 20a) directly cause changes in the second wireless signal (20b) (e.g., signals may simply be out of phase from one another). A parallel relationship may occur, e.g., when the second wireless signal (20b) changes with the same magnitude and in the same direction as the changing magnitude and direction of the first wireless signal (20a) [e.g., either both positive or both negative]. And a reciprocal relationship may occur, e.g., when the second wireless signal (20b) changes with the same magnitude of the first wireless signal (20a) but in an opposite direction [e.g., when 20a is positive, then 20b is negative, or vice-versa]. The correlation procedure further may determine a degree of correlation between two wireless signals. For example, correlation may be determined when the correlation is relatively high or above a predetermined threshold. This threshold may consider a number of factors, including but not limited to the distance between the sensors, the circuitry coupled to the sensors, and the type of sensing system used.
The correlation procedure may evaluate a signal within a window of time or frequencies—e.g., it may use a window function where the window has an upper limit (U, U1, U2, etc.) and a lower limit (L, L1, L2, etc.) (e.g., a time range in the time domain or a frequency range in the frequency domain). Windowing a signal in the time domain or in the frequency domain is known to skilled artisans and will not be elaborated further here. Examples of windowing are shown in
The correlation procedure may include determining a wireless signal strength of each of the wireless signals (steps 310, 320, 330). In one embodiment, this is a relative signal strength (e.g., using a relative signal strength indicator or indication or RSSI). The correlation procedure further may comprise determining a correlation coefficient of the wireless signal strengths (e.g., determining a correlation coefficient may include performing a cross-correlation that is normalized for signals within a particular window). In another implementation, the correlation procedure includes using two windows (e.g., two adjacent windows) to analyze an RSSI sample index and also may include performing a correlation coefficient of the wireless signal RSSI sample index values (e.g., an autocorrelation that is normalized). Examples of these techniques are shown in
In at least one embodiment of the gauge sensor 20a and differential pressure sensor 20b, physical proximity (d) of the sensors 20a and 20b is less than or equal to one wavelength (λ) of the SRWC means (i.e., d≤λ). For example, if the wireless transmission frequency of the gauge and differential pressure sensors 20a, 20b is 2.4 GHz, then the spacing between sensors 20a and 20b is less than or equal to 0.125 meters.
Referring still to
The techniques described above may be implemented in step 340 of method 300. These techniques may be implemented individually or in combination with one another. For example, one or more correlation procedures may be performed for any particular sensor 20. Any or all of these implementations may be performed using software application 42 stored on ECU memory 34. Processor 32 may be configured to perform instructions of application 42 to perform one or more correlation procedures in step 340 and perform one or more of the remaining steps of the method 300. Following step 340, the method proceeds to step 350.
In step 350, processor 32 determines whether an absence of correlation exists based on the correlation procedure performed in step 340. Again, an absence of correlation may exist when the wireless sensor data indicates non-spatial or non-temporal correlation (e.g., when the third wireless signal does not correlate (or does not highly correlate) with the first or second wireless signals, as described above). When an absence of correlation exists, the method proceeds to step 360; and when an absence of correlation does not exist, the method proceeds to step 380.
In step 360, the method may determine which one of the received wireless signals is associated with malicious attacker 50. For example, where a normalized autocorrelation procedure is performed, it may be apparent which wireless signal is being spoofed. Or for example, a number of correlation coefficients may be performed and the wireless signal associated with the attacker 50 may be apparent by a process of elimination. These are merely examples; other techniques may be employed as well. And in some instances, it may not be desirable to identify which sensor is being spoofed; i.e., it may be sufficient to merely identify that an attack is occurring. In step 360, the ECU 30 may send an alert to other VSMs 18 in the vehicle. This alert may be reported to the user of the vehicle, a vehicle service center, and/or a backend system. Then the method proceeds to step 370.
In step 370, the method ignores data associated with at least one of the first, second, or third wireless signals—e.g., where the third wireless signal strength SA was determined to be associated with attacker 50. Of course, the legitimate data (carried by the first and second wireless signals) may be used by the TPMS module 18. In other embodiments, at least a portion of data collected in the TPMS 18 may be ignored until the TPMS is serviced by maintenance personnel. Thereafter, method 300 ends.
Returning to step 380, in step 380 the data from each of the first, second, and third wireless signals is used. Thus, in at least one implementation of steps 340 and 350, no malicious attacker was discovered. For example, in TPMS module 18, there may be multiple or redundant sensors (e.g., a redundant gauge sensor). Thus, data from all three sensors may be used. As discussed above,
Other implementations also exist. In at least one implementation, two sensors such as 20a and 20b are used and other wireless sensor signals within vehicle 12 are distinguished from one another using method 300. For example, assume TPMS module receives data from only two wireless sensors which are proximately located with respect to one another. And then assume that the engine control module (ECM) has one wireless sensor which is spaced from the TPMS sensors. Method 300 may be used by the TPMS module to ignore data sent by the ECM sensor, e.g., treating the ECM sensor as malicious. This of course is merely another example of how method 300 may be utilized. Other methods will be apparent to skilled artisans.
Thus, there has been described a vehicle communication network that has a number of electronic control units (ECUs) (e.g., associated with various vehicle system modules). At least some of the ECUs are in wireless communication with one or more sensors. In order to maintain network security, at least one correlation procedure is performed using wireless signal data received by the one or more sensors. Wireless signals from malicious attackers are determinable using the correlation procedure(s). The system may provide continuous, real-time authentication if desired. Moreover, the system described herein has fewer latencies, as the wireless transmissions do not require encryption to protect the system and vehicle.
It is to be understood that the foregoing is a description of one or more embodiments of the invention. The invention is not limited to the particular embodiment(s) disclosed herein, but rather is defined solely by the claims below. Furthermore, the statements contained in the foregoing description relate to particular embodiments and are not to be construed as limitations on the scope of the invention or on the definition of terms used in the claims, except where a term or phrase is expressly defined above. Various other embodiments and various changes and modifications to the disclosed embodiment(s) will become apparent to those skilled in the art. All such other embodiments, changes, and modifications are intended to come within the scope of the appended claims.
As used in this specification and claims, the terms “e.g.,” “for example,” “for instance,” “such as,” and “like,” and the verbs “comprising,” “having,” “including,” and their other verb forms, when used in conjunction with a listing of one or more components or other items, are each to be construed as open-ended, meaning that the listing is not to be considered as excluding other, additional components or items. Other terms are to be construed using their broadest reasonable meaning unless they are used in a context that requires a different interpretation.
Laifenfeld, Moshe, Tsouri, Gill R.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
5703414, | Oct 28 1994 | Honda Giken Kogyo Kabushiki Kaisha | Anti-theft apparatus which permits the engine to start prior to ID signal discrimination |
6946949, | Nov 30 1999 | Continental Automotive GmbH | Anti-theft protection system for a motor vehicle, and a method for operating an anti-theft protection system |
7506540, | Feb 22 2008 | GM Global Technology Operations LLC | Autolocation of wireless tire pressure monitoring sensors |
7840225, | Mar 18 2004 | Cisco Technology, Inc. | Radiolocation in a wireless network using time difference of arrival |
7952519, | Apr 16 2010 | UTI Limited Partnership | Method and system for detecting GNSS spoofing signals |
8918232, | Jan 11 2013 | General Motors LLC | Short range wireless communication between a vehicle and a handheld communications device |
20020080938, | |||
20030156025, | |||
20050001716, | |||
20110184586, | |||
20130227648, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
May 08 2015 | TSOURI, GILL R | GM Global Technology Operations LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 035671 | /0302 | |
May 09 2015 | GM Global Technology Operations LLC | (assignment on the face of the patent) | / | |||
May 09 2015 | LAIFENFELD, MOSHE | GM Global Technology Operations LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 035671 | /0302 |
Date | Maintenance Fee Events |
Jan 20 2023 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
Aug 20 2022 | 4 years fee payment window open |
Feb 20 2023 | 6 months grace period start (w surcharge) |
Aug 20 2023 | patent expiry (for year 4) |
Aug 20 2025 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 20 2026 | 8 years fee payment window open |
Feb 20 2027 | 6 months grace period start (w surcharge) |
Aug 20 2027 | patent expiry (for year 8) |
Aug 20 2029 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 20 2030 | 12 years fee payment window open |
Feb 20 2031 | 6 months grace period start (w surcharge) |
Aug 20 2031 | patent expiry (for year 12) |
Aug 20 2033 | 2 years to revive unintentionally abandoned end. (for year 12) |